Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a45a274a4e88af98267fea779a1f482a7a9fff3b97bfdc193e2792ee00a1e60e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a45a274a4e88af98267fea779a1f482a7a9fff3b97bfdc193e2792ee00a1e60e.dll
-
Size
178KB
-
MD5
5747be7d764f83aa2db9ecc4ee7e7b3a
-
SHA1
a96e91d46ffa9e978476f4e2cae582a903785425
-
SHA256
a45a274a4e88af98267fea779a1f482a7a9fff3b97bfdc193e2792ee00a1e60e
-
SHA512
b054e4bec1e3e35232d7c4b342969459813d04375fc6f47bb14f6ca4684cfb82258f20f0ba1312563b7b8dca85abdf059d8e6acd6eb0d5f470b32a6d968b2a08
-
SSDEEP
3072:KZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtlUucGZ2:KUAk9I4vgz/V2dulz6/hvOhG
Malware Config
Extracted
dridex
22201
142.93.223.149:443
128.199.36.62:4664
50.116.54.215:13786
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2932-1-0x0000000074E50000-0x0000000074E81000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2932 2192 rundll32.exe 31 PID 2192 wrote to memory of 2932 2192 rundll32.exe 31 PID 2192 wrote to memory of 2932 2192 rundll32.exe 31 PID 2192 wrote to memory of 2932 2192 rundll32.exe 31 PID 2192 wrote to memory of 2932 2192 rundll32.exe 31 PID 2192 wrote to memory of 2932 2192 rundll32.exe 31 PID 2192 wrote to memory of 2932 2192 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a45a274a4e88af98267fea779a1f482a7a9fff3b97bfdc193e2792ee00a1e60e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a45a274a4e88af98267fea779a1f482a7a9fff3b97bfdc193e2792ee00a1e60e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2932
-